Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,069,983 Method and apparatus for protecting sensitive information from disclosure through virtual machines files
A method and apparatus for protecting sensitive information from disclosure through virtual machine files is disclosed. In one embodiment, the method includes...
US-9,069,980 Methods and systems for securing data by providing continuous user-system binding authentication
Devices, methods, and computer programs are presented for managing data security. One example method includes receiving user identification information from a...
US-9,069,972 Secure digital card, and secure digital card system and operating method
A Secure Digital (SD) card, and an system and an operating method for the SD card are disclosed. The disclosed SD card has a Flash memory and a controller. The...
US-9,069,955 File system level data protection during potential security breach
Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file...
US-9,069,953 Method for checking data consistency in a system on chip
The invention aims to provide a method and a system on chip able to detect at once hardware and software errors to prevent manipulations for retrieving...
US-9,069,933 Secure, networked portable storage device
A secure, networked portable storage device includes: a secure data storage section; a program storage section including a security program operatively...
US-9,069,930 Security information and event management system employing security business objects and workflows
A security information and event management (SIEM) system includes a data storage sub-system that stores (1) security data pertaining to security-related events...
US-9,069,782 System and method for security and privacy aware virtual machine checkpointing
A checkpointing method for creating a file representing a restorable state of a virtual machine in a computing system, comprising identifying processes...
US-9,069,766 Content-based isolation for computing device security
The subject disclosure is directed towards securing a computing device using content-based isolation. When the computing device requests content data having...
US-9,069,703 Encrypted-transport solid-state disk controller
An encrypted transport SSD controller has an interface for receiving commands, storage addresses, and exchanging data with a host for storage of the data in a...
US-9,069,637 Dynamic feature enhancement in client server applications and high volume server deployment with dynamic app...
Generally, this disclosure provides methods and systems for dynamic feature enhancement in client server applications and for high volume server deployment with...
US-9,069,626 Trusted client-centric application architecture
A Trusted Client-Centric Application Architecture (TC.sup.2A.sup.2) provides the ability to securely exchange data between applications. TC.sup.2A.sup.2 may be...
US-9,069,533 Data center container with draining mechanism
A data center container includes a chassis, a cooling system, a draining mechanism, and a latching member. The chassis includes a front plate with a securing...
US-9,069,356 Nomadic security device with patrol alerts
There is provided a device such as a robot that includes a processor and a number of sensors. Each of the sensors provides respective sensor data to the...
US-9,067,390 Data carrier card having a security thread
A data carrier card, in particular a chip and/or magnetic strip card, has a card body comprising one or more films and a security thread integrated in the card...
US-9,066,211 Decision support
Decision support information is exchanged over a secure wireless network among mobile computing devices, and also optionally a central command computer. Each of...
US-9,065,908 Method and system for ensuring user and/or device anonymity for location based services (LBS)
A mobile device may communicate with a location server during location based services (LBS) operations using a secure identifier. The secure identifier...
US-9,065,878 System and method for providing a remote virtual screen view
A system for virtual screen view service, comprising a monitored computer platform, a monitoring computer platform, a server installed on the monitored computer...
US-9,065,846 Analyzing data gathered through different protocols
A security analysis of data received on a mobile communications device includes gathering information about the data through at least two of multiple network...
US-9,065,806 Internet based security information interaction apparatus and method
The present invention discloses a device and method for security information interaction. The device for security information interaction includes: an interface...
US-9,065,804 Systems and methods for implementing security in a cloud computing environment
Computer systems and methods are provided in which an agent executive, when initially executed in a virtual machine, obtains an agent API key from a user. This...
US-9,065,593 Securing speech recognition data
Methods and apparatus for reducing security vulnerabilities in a client/server speech recognition system including one or more client computers and one or more...
US-9,064,364 Confidential fraud detection system and method
Various embodiments for maintaining security and confidentiality of data and operations within a fraud detection system. Each of these embodiments utilizes a...
US-9,064,256 Products and processes for utilizing order data and related data
In an embodiment, an apparatus comprises a processor, and a memory that stores a program. The program, when executed by the processor, directs the processor to...
US-9,064,210 Semantically-aware behavioral security analysis system for security information and event management
A behavioral security analysis system comprises a computational semantic parser configured to process data associated with a security information and event...
US-9,064,133 Method and apparatus of securely processing data for file backup, de-duplication, and restoration
Disclosed are an apparatus and methods of determining if at least one data file has been de-duplicated. One example method may include receiving a filekey based...
US-9,064,127 Systems and methods for securing data in the cloud
A secure data parser is provided that may be integrated into any suitable system for securely storing data in and communicating data with cloud computing...
US-9,064,116 Techniques for security management provisioning at a data storage device
Techniques for a data storage device to locally implement security management functionality. In an embodiment, a security management process of the data storage...
US-9,064,113 Performing virus scan during decompression of an application installation package
Disclosed in the present invention are a method and apparatus for checking a process of decompressing an application installation package. The present invention...
US-9,064,103 Method and apparatus for secure credential entry without physical entry
A method and apparatus are disclosed wherein a portable memory storage device is provided for interfacing with a communications port of the computer system....
US-9,063,966 Selective monitoring of archive and backup storage
Systems and methods for providing information security in a network environment. The method includes receiving a user selection of a data section recorded on a...
US-9,063,899 Security in virtualized computer programs
In an embodiment, a data processing method comprises implementing a memory event interface to a hypercall interface of a hypervisor or virtual machine operating...
US-9,063,897 Policy-based secure information disclosure
Systems and methods for storing data and retrieving data from a smart storage device is provided, where smart storage includes processing capabilities along...
US-9,063,889 System and method for secure mode for processors and memories on multiple semiconductor dies within a single...
A computing system comprising a processor having a first and second bus (the processor on a first semiconductor die mounted within a semiconductor package), a...
US-9,063,830 Micro-SD device loaded with a smart card
A Micro-Secure Digital ("SD") device loaded with a smart card that can be issued in bulk and in card form is provided. The device includes: a SD interface...
US-9,063,706 Data storage device mounting apparatus
A data storage device mounting apparatus includes a base, a securing member, and a cover engaged with the base. The base includes a receiving portion and a...
US-9,060,271 Secure short message service (SMS) communications
Embodiments of the present disclosure provide systems and methods for secure Short Message Service (SMS) communications. According to an embodiment, a method of...
US-9,060,266 Apparatus and method of providing medical data based on a handover of a medical sensor
An apparatus and method are provided for providing medical data based on a handover of a medical sensor. The apparatus includes a medical data client that...
US-9,060,240 Multi-tier wireless home mesh network with a secure network discovery protocol
An apparatus, system and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless...
US-9,060,024 Security event data normalization
Normalizing security event data from multiple different network agents. The data from the multiple different agents is categorized and tagged with a descriptor...
US-9,060,009 Network-extended data storage for mobile applications
Embodiments of the present invention are directed to methods and subsystems directed to increasing the amount of memory accessible to software and hardware...
US-9,059,988 Printing device capable of authorizing printing limitedly according to user level, printing system using the...
A printing device which authorizes a printing limitedly according to a user level, a printing system using the same and a printing method thereof. The printing...
US-9,059,985 Methods for fraud detection
Method and systems for validating a client user in a secured network are provided. Upon authentication, a user is supplied a login cookie that includes...
US-9,059,974 Secure mobile app connection bus
A secure mobile application connection bus is disclosed. First encryption information and an identifier associated with a data storage location on a mobile...
US-9,059,971 Systems and methods for secure voice communications
A secure voice solution for a PDA-type device is provided. Voice data is received from the user using the device microphone and built- in media player software...
US-9,059,969 Apparatus, method and system for a tunneling client access point
The disclosure details the implementation of a tunneling client access point (TCAP) that is a highly secure, portable, power efficient storage and data...
US-9,059,965 Method and system for enforcing security policies on network traffic
A computer readable medium that includes computer readable program code embodied therein. The computer readable medium causes the computer system to receive, by...
US-9,059,962 Secure access to applications behind firewall
A user having remote device wants to access an application executing on an application server computer that is behind a firewall. During set-up, another...
US-9,059,894 Data exchange technology
A data exchange adaptor that synchronizes data between an enterprise system operated by a company and a cloud-based system operated by a third party other than...
US-9,059,863 Method for data routing in networks
An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.